Search dblp for Publications

export results for "toc:db/journals/ijidss/ijidss5.bht:"

 download as .bib file

@article{DBLP:journals/ijidss/AndersonRNKW18,
  author       = {Graeme Anderson and
                  David Reed and
                  Simon Di Nucci and
                  Anthony Kwong and
                  Janet Wilson},
  title        = {Weapons effects modelling for safety applications},
  journal      = {Int. J. Intell. Def. Support Syst.},
  volume       = {5},
  number       = {4},
  pages        = {253--276},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJIDSS.2018.099878},
  doi          = {10.1504/IJIDSS.2018.099878},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijidss/AndersonRNKW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijidss/BourqueGBCBO18,
  author       = {Fran{\c{c}}ois{-}Alex Bourque and
                  Raffaele Grasso and
                  Ra{\'{u}}l Vicen Bueno and
                  Giampaolo Cimino and
                  Paolo Braca and
                  John Osler},
  title        = {A decision support web service for allocating assets in counter-piracy
                  operations given periodic environmental forecast updates},
  journal      = {Int. J. Intell. Def. Support Syst.},
  volume       = {5},
  number       = {4},
  pages        = {314--331},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJIDSS.2018.099897},
  doi          = {10.1504/IJIDSS.2018.099897},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijidss/BourqueGBCBO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijidss/MishraMM18,
  author       = {Jyoti Prakash Mishra and
                  Sambit Kumar Mishra and
                  Anil Kumar Mishra},
  title        = {Opportunities with visualisation linked with virtualised data: a case
                  study},
  journal      = {Int. J. Intell. Def. Support Syst.},
  volume       = {5},
  number       = {4},
  pages        = {305--313},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJIDSS.2018.099892},
  doi          = {10.1504/IJIDSS.2018.099892},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijidss/MishraMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijidss/SinhaRPAK18,
  author       = {G. R. Sinha and
                  K. Srujan Raju and
                  Raj Kumar Patra and
                  Daw Win Aye and
                  Daw Thuzar Khin},
  title        = {Research studies on human cognitive ability},
  journal      = {Int. J. Intell. Def. Support Syst.},
  volume       = {5},
  number       = {4},
  pages        = {298--304},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJIDSS.2018.099891},
  doi          = {10.1504/IJIDSS.2018.099891},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijidss/SinhaRPAK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijidss/TavakolianNAM18,
  author       = {Niloofar Tavakolian and
                  Azadeh Nazemi and
                  Zohreh Azimifar and
                  Iain Murray},
  title        = {Face recognition under occlusion for user authentication and invigilation
                  in remotely distributed online assessments},
  journal      = {Int. J. Intell. Def. Support Syst.},
  volume       = {5},
  number       = {4},
  pages        = {277--297},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJIDSS.2018.099889},
  doi          = {10.1504/IJIDSS.2018.099889},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijidss/TavakolianNAM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijidss/Au15,
  author       = {T. Andrew Au},
  title        = {Evaluating digital targeting in a joint fires experiment},
  journal      = {Int. J. Intell. Def. Support Syst.},
  volume       = {5},
  number       = {3},
  pages        = {186--204},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJIDSS.2015.075475},
  doi          = {10.1504/IJIDSS.2015.075475},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijidss/Au15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijidss/Ingber15,
  author       = {Lester Ingber},
  title        = {Biological impact on military intelligence: application or metaphor?},
  journal      = {Int. J. Intell. Def. Support Syst.},
  volume       = {5},
  number       = {3},
  pages        = {173--185},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJIDSS.2015.075474},
  doi          = {10.1504/IJIDSS.2015.075474},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijidss/Ingber15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijidss/KalyanGNH15,
  author       = {Varun Kalyan and
                  Subhashini Ganapathy and
                  S. Narayanan and
                  Raymond R. Hill},
  title        = {Integrated vehicle routing: a case study of unmanned aerial vehicle
                  decision making},
  journal      = {Int. J. Intell. Def. Support Syst.},
  volume       = {5},
  number       = {3},
  pages        = {205--225},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJIDSS.2015.075476},
  doi          = {10.1504/IJIDSS.2015.075476},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijidss/KalyanGNH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijidss/MishraKBDC15,
  author       = {Bhabani Shankar Prasad Mishra and
                  Eui{-}Whan Kim and
                  Guck{-}Cheol Bang and
                  Satchidananda Dehuri and
                  Sung{-}Bae Cho},
  title        = {Weapon target assignment problem: multi-objective formulation, optimisation
                  using {MOPSO} and {TOPSIS}},
  journal      = {Int. J. Intell. Def. Support Syst.},
  volume       = {5},
  number       = {3},
  pages        = {226--252},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJIDSS.2015.075483},
  doi          = {10.1504/IJIDSS.2015.075483},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijidss/MishraKBDC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijidss/El-Mahassni14,
  author       = {Edwin El{-}Mahassni},
  title        = {Sensor selection and fusion using subjective logic},
  journal      = {Int. J. Intell. Def. Support Syst.},
  volume       = {5},
  number       = {2},
  pages        = {95--108},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJIDSS.2014.059960},
  doi          = {10.1504/IJIDSS.2014.059960},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijidss/El-Mahassni14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijidss/RyanRO14,
  author       = {Peter John Ryan and
                  Peter Ross and
                  William Oliver},
  title        = {High fidelity simulation using the updated distributed interactive
                  simulation standard},
  journal      = {Int. J. Intell. Def. Support Syst.},
  volume       = {5},
  number       = {2},
  pages        = {109--126},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJIDSS.2014.059959},
  doi          = {10.1504/IJIDSS.2014.059959},
  timestamp    = {Tue, 21 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijidss/RyanRO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijidss/TecuciSMB14,
  author       = {Gheorghe Tecuci and
                  David A. Schum and
                  Dorin Marcu and
                  Mihai Boicu},
  title        = {Computational approach and cognitive assistant for evidence-based
                  reasoning in intelligence analysis},
  journal      = {Int. J. Intell. Def. Support Syst.},
  volume       = {5},
  number       = {2},
  pages        = {146--172},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJIDSS.2014.059976},
  doi          = {10.1504/IJIDSS.2014.059976},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijidss/TecuciSMB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijidss/VermeulenS14,
  author       = {Arthur Vermeulen and
                  Ralph Savelsberg},
  title        = {Interception of an aerodynamically stable weaving re-entry vehicle},
  journal      = {Int. J. Intell. Def. Support Syst.},
  volume       = {5},
  number       = {2},
  pages        = {127--145},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJIDSS.2014.059965},
  doi          = {10.1504/IJIDSS.2014.059965},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijidss/VermeulenS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijidss/FinkenstadtLBJHMS12,
  author       = {Daniel Finkenstadt and
                  Samuel George Lambrakos and
                  Noam Bernstein and
                  Verne L. Jacobs and
                  Lulu Huang and
                  Lou Massa and
                  Andrew Shabaev},
  title        = {Construction of permittivity functions for high-explosives using density
                  functional theory},
  journal      = {Int. J. Intell. Def. Support Syst.},
  volume       = {5},
  number       = {1},
  pages        = {24--43},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJIDSS.2012.053648},
  doi          = {10.1504/IJIDSS.2012.053648},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijidss/FinkenstadtLBJHMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijidss/GrantS12,
  author       = {Matthew Grant and
                  Mark G. Stewart},
  title        = {A systems model for probabilistic risk assessment of improvised explosive
                  device attacks},
  journal      = {Int. J. Intell. Def. Support Syst.},
  volume       = {5},
  number       = {1},
  pages        = {75--93},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJIDSS.2012.053664},
  doi          = {10.1504/IJIDSS.2012.053664},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijidss/GrantS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijidss/UsbeckCR12,
  author       = {Kyle Usbeck and
                  Jeffrey Cleveland and
                  William C. Regli},
  title        = {Network-centric {IED} detection planning},
  journal      = {Int. J. Intell. Def. Support Syst.},
  volume       = {5},
  number       = {1},
  pages        = {44--74},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJIDSS.2012.053665},
  doi          = {10.1504/IJIDSS.2012.053665},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijidss/UsbeckCR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijidss/WeissBWTHH12,
  author       = {Lora Weiss and
                  Erica Briscoe and
                  Elizabeth T. Whitaker and
                  Ethan Trewhitt and
                  Heather Hayes and
                  John Horgan},
  title        = {A systems-level understanding of adversarial behaviour},
  journal      = {Int. J. Intell. Def. Support Syst.},
  volume       = {5},
  number       = {1},
  pages        = {4--23},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJIDSS.2012.053676},
  doi          = {10.1504/IJIDSS.2012.053676},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijidss/WeissBWTHH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics